Let’s take a lucky guess that you’re here today because you’ve heard a lot about cryptocurrencies and you want to get involved, right? If you’re a community person, Dogecoin mining might be the perfect start for you!submitted by alifkhalil469 to BtcNewz [link] [comments]
Bitcoin was the first in 2009, and now there are hundreds of cryptocurrencies. These new coins (that operate on their own native blockchain) are called altcoins or alternative coins. One popular altcoin is Dogecoin. It can be bought, sold and traded, just like Bitcoin. It can also be mined!
So, what is Dogecoin mining?
You’ll know what hardware and what software you need to get started. You’ll also know whether or not Dogecoin mining is for you!
So, where would you like to start? The beginning? Great choice. Let’s have a quick look at how Dogecoin got started.
A (Very) Short History of Dogecoin
In 2013, an Australian named Jackson Palmer and an American named Billy Markus became friends. They became friends because they both liked cryptocurrencies. However, they also thought the whole thing was getting too serious so they decided to create their own.
Palmer and Markus wanted their coin to be more fun and more friendly than other crypto coins. They wanted people who wouldn’t normally care about crypto to get involved.
They decided to use a popular meme as their mascot — a Shiba Inu dog.
Dogecoin was launched on December 6th, 2013. Since then it has become popular because it’s playful and good-natured. Just like its mascot!
Dogecoin has become well-known for its use in charitable acts and online tipping. In 2014, $50,000 worth of Dogecoin was donated to the Jamaican Bobsled Team so they could go to the Olympics. Dogecoin has also been used to build wells in Kenya. Isn’t that awesome!
Users of social platforms – like Reddit – can use Dogecoin to tip or reward each other for posting good content.
Dogecoin has the 27th largest market cap of any cryptocurrency.
Note: A market cap (or market capitalization) is the total value of all coins on the market.
So, Dogecoin is a popular altcoin, known for being fun, friendly and kind. It’s a coin with a dog on it! You love it already, don’t you?
Next, I want to talk about how mining works…
What is Mining?
To understand mining, you first need to understand how cryptocurrencies work. Cryptocurrencies are peer-to-peer digital currencies. This means that they allow money to be transferred from one person to another without using a bank.
Every cryptocurrency transaction is recorded on a huge digital database called a blockchain. The database is stored across thousands of computers called nodes. Nodes put together groups of new transactions and add them to the blockchain. These groups are called blocks.
Each block of transactions has to be checked by all the nodes on the network before being added to the blockchain. If nodes didn’t check transactions, people could pretend that they have more money than they really do (I know I would!).
Confirming transactions (mining) requires a lot of computer power and electricity so it’s quite expensive.
Blockchains don’t have paid employees like banks, so they offer a reward to users who confirm transactions. The reward for confirming new transactions is new cryptocurrency. The process of being rewarded with new currency for confirming transactions is what we call “mining”!
It is called mining because it’s a bit like digging for gold or diamonds. Instead of digging with a shovel for gold, you’re digging with your computer for crypto coins!
Each cryptocurrency has its own blockchain. Different ways of mining new currency are used by different coins where different rewards are offered.
So, how do you mine Dogecoin? What’s special about Dogecoin mining? Let’s see…
What is Dogecoin Mining?
Dogecoin mining is the process of being rewarded with new Dogecoin for checking transactions on the Dogecoin blockchain. Simple, right? Well no, it’s not quite that simple, nothing ever is!
Mining Dogecoin is like a lottery. To play the lottery you have to do some work. Well, actually your computer (or node) has to do some work! This work involves the confirming and checking of transactions which I talked about in the last section.
Lots of computers work on the same block of transactions at the same time but the only one can win the reward of new coins. The one that earns the new coins is the node that adds the new block of transactions to the old block of transactions. This is completed using complex mathematical equations.
The node that solves the mathematical problem first wins! It can then attach the newly confirmed block of transactions to the rest of the blockchain.
Most cryptocurrency mining happens this way. However, Dogecoin mining differs from other coins in several important areas. These areas are;
Bitcoin uses SHA-256 to guide the mining of new currency and the other two use Scrypt. This is an important difference because Scrypt mining needs a lot less power and is a lot quicker than SHA-256. This makes mining easier for miners with less powerful computers. Fans of Litecoin and Dogecoin think that they are fairer than Bitcoin because more people can mine them.
Note: In 2014, Litecoin and Dogecoin merged mining. This means they made it possible to mine both coins in the same process. Dogecoin mining is now linked with Litecoin mining. It’s like two different football teams playing home games in the same stadium!
Mining Dogecoin is a lot faster than mining Litecoin or Bitcoin. The block reward is much higher too!
Don’t get too excited though (sorry!). Dogecoin is still worth a lot less than Bitcoin and Litecoin. A reward of ten thousand Dogecoin is worth less than thirty US Dollars. A reward of 12.5 Bitcoin is currently worth 86,391.63 US Dollars!
However, it’s not as bad as it sounds. Dogecoin mining difficulty is more than one million times less than Bitcoin mining difficulty. This means you are much more likely to win the block reward when you mine Dogecoin.
Now I’ve told you about what Dogecoin mining is and how it works, would you like to give it a try?
Let’s see what you need to do to become a Dogecoin miner…
How to Mine Dogecoin
There are two ways to mine Dogecoin, solo (by yourself) or in a Dogecoin mining pool.
Note: A Dogecoin pool is a group of users who share their computing power to increase the odds of winning the race to confirm transactions. When one of the nodes in a pool confirms a transaction, it divides the reward between the users of the pool equally.
Dogecoin Mining: Solo vs Pool
When you mine as a part of a Dogecoin pool, you have to pay fees. Also, when the pool mines a block you will only receive a small portion of the total reward. However, pools mine blocks much more often than solo miners. So, your chance of earning a reward (even though it is shared) is increased. This can provide you with a steady new supply of Dogecoin.
If you choose to mine solo then you risk waiting a long time to confirm a transaction because there is a lot of competition. It could be weeks or even months before you mine your first block! However, when you do win, the whole reward will be yours. You won’t have to share it or pay any fees.
As a beginner, I would recommend joining a Dogecoin pool. This way you won’t have to wait as long to mine your first block of new currency. You’ll also feel like you’re part of the community and that’s what Dogecoin is all about!
What You Need To Start Mining Dogecoin
Before you start Dogecoin mining, you’ll need a few basics. They are;
Note: A wallet is like an email account. It has a public address for sending/receiving Dogecoin and a private key to access them. Your private keys are like your email’s password. Private keys are very important and need to be kept completely secure.
There are two different types; a light wallet and a full wallet. To mine Dogecoin, you’ll need the full wallet. It’s called Dogecoin Core.
Now that you’ve got a wallet, you need some software and hardware.
Dogecoin Mining Hardware
You can mine Dogecoin with;
Whether you’re mining with an ASIC, a GPU or a CPU, you’ll need some software to go with it. You should try to use the software that works best with the hardware you’re using. Here’s a short list of the best free software for each choice of mining hardware;
You’re a beginner, so keep it simple! When you first start mining Dogecoin I would recommend using a GPU like the Radeon RX 580 with EasyMiner software. Then I would recommend joining a Dogecoin mining pool. The best pools to join are multi-currency pools like Multipool or AikaPool.
If you want to mine Dogecoin but don’t want to invest in all the tech, there is one other option…
Dogecoin Cloud Mining
Cloud mining is mining without mining! Put simply, you rent computer power from a huge data center for a monthly or yearly fee. The Dogecoin is mined at the center and then your share is sent to you.
All you need to cloud mine Dogecoin is a Dogecoin wallet. Then choose a cloud mining pool to join. Eobot, Nice Hash and Genesis Mining all offer Scrypt-based cloud mining for a monthly fee.
There are pros and cons to Dogecoin cloud mining;
So, Is Dogecoin Mining Profitable?
The short answer is, not really. Dogecoin mining is not going to make you a crypto billionaire overnight. One Dogecoin is worth 0.002777 US Dollars. If you choose to mine Dogecoin solo, it will be difficult to make a profit. You will probably spend more money on electricity and hardware than you will make from Dogecoin mining. Even if you choose a Dogecoin pool or a cloud pool your profits will be small.
However, if you think I am telling you to not mine Dogecoin, then you’re WRONG! Of course, I think you should mine Dogecoin!
But why? Seriously…
Well, you should mine Dogecoin because it’s fun and you want to be a part of the Dogecoin family. Cryptocurrency is going to change the world and you want to be part of that change, right? Mining Dogecoin is a great way to get involved.
Dogecoin is the coin that puts a smile on people’s faces. By mining Dogecoin you’ll be supporting all the good work its community does. You’ll learn about mining from the friendliest gang in crypto. And who knows? In a few years, the Dogecoin you mine now could be worth thousands or even millions! In 2010, Bitcoin was worthless. Think about that!
Only you can choose whether to mine Dogecoin or not. You now know everything you need to know to make your choice. The future is here. So, what are you going to do?
|Was there a time when you felt demoralized because of your job?||Over 15 years, there are times when you aren't succesfull. Example, we were tracking a terrorist group and one of the actors popped up on our radar from his Aim traffic (yes aol instant messenger) and the gist of it is, he suspected we were after them and they made the decision to kill their hostages then and there across the wire. By the time we sent someone in to the location we identified they were dead.|
|I would love to share stories with you. You sound like you've been around the block. :)||Oh that I have, too many to be honest. That's why I like the desk work much more.|
|What's the most fucked up thing you've found on an "victims" compute server?||I've seen death footage, child pornography, bestiality, pretty much everything you'd find online. I think the footage that always bothered me was footage where you saw victims looking in the camera. This goes for anything seen anywhere, seeing the real despair in their eyes ages your soul quickly.|
|When you found these videos & photos, what are you required to do with them? Is there some database to store all the shit found?||In most instances we archive them. It's important to realize that we don't just jump on and grab everything. Ideally we pull the least amount of data necessary and many times it takes hours due to bandwidth limiting / restrictions we place to stay under the radar. In the case of pulling a video, you better have a good justification for that much utilization. In that case we did, so it was archived.|
|What is it like compared to movies/tv?||It's long hours of a black screen with white text. I wish I could send animated rabits and cookie monsters.|
|What is your daily schedule like?||Daily schedule is based on work i'm doing. We're always on call and i've pulled a few days - weeks at my desk sleeping on a cot before with very little leaving the office.|
|HACK THE PLANET.||I'm surprised you didn't chose They're Trashing our rights|
|<--- Insert Orbital - Halcyon and on and on -|
|What would you have to be monitoring that closely that you'd have to sleep at the computer?||Waiting for a "callback" or response from a computer your operating on, waiting for an opportunity, or possibly a Humint resource to do his task. Maybe i'm on call for troops on the ground.|
|Hackers, my all time fav movie.||It's a great one. So cheesy but in a good way. Whenever someone made a noob error or comment at work our collective punishment was to make them watch that in the background on their next operation. That lasted about two weeks. .. Sometime later the Nyan Cat popped up for an 8 hour rotation. Last time I saw anything non news playing on the screens.|
|Interesting , so if you were providing support to troops on the ground what sort of things would that entail? thanks for your response!||Well you could be monitoring for insurgent chatter, maybe you're there to help take down obstacles electronically. If I can do something that keeps troops out of harms way it's worth losing sleep. Maybe they're their to dispatch a small drone to get me closer access or something. Who knows, let your mind run. It'll probably hit one or two correct ideas ;)|
|Fuckin' Nyan cat||Thank god it wasn't Nein cat. that would have gone over like a fart in church!|
|How's the Intersect Project going?||Daniel Shaw stole it last I heard.|
|3) What risks do Intel structures that lack transparency have of being captured by undemocratic interests? And how would that capture affect our society? And how could that be reversed? 5) Why do you think people continue to adhere to the illusion that we are separate from one another? 6) what will the world look like in 10 years? 100 years? 1000 years? 10,000 years?||1) Nope, the risk is all my own. 2) The fragile dependance on electronics in general 3) The risk is lower than you'd think, but a risk none the less. Domestically it wouldn't crush us as it's just not how things are setup. Internationally, they're all already doing the same thing. 4). I think it's a bit of both. I know a cop out answer. I think whom you're born to or where you're born can give you advantages in life, making it much harder for honest hard working individuals to reap the same benefits. I think technology is the gift changing that. All the old rules really don't apply. Any kid in his basement as often said, could be the next billionaire. 5) I think people over estimate their individual importance. No species survives because of one, it's because of group effort and sacrifice. Free will sorta messes this up a bit. 6) 10 years, I hope we've really made 3d printing economical and domestic goods are able to be produced as cheaply and efficiently as foreign made goods. 100 years, I hope we have the ability transcend more of our differences. Africa as a continent has been given new life, partially restored to it's pre imperialist state. That we've eradicated many diseases and can cure if not manage cancer to where it's negligible.|
|Note: This is a hypothetical situation produced merely to satiate my curiosity. I do not condone any illicit activities, nor do I mean to imply that I have participated in anything similar to the scenario about to be described. Let's say I buy a laptop, giving the store I bought it from false information. I then log onto a public wi-fi source. Let's say I have my face concealed the whole time and avoid identification via cameras. I hack into major corporations with this laptop and copy, and subsequently distribute sensitive data. I do not do this at the same location twice, and I am constantly moving. I use a random number generator to determine my next location. How would you catch me?||That's a good question, Every attacker has a profile or standard modus operandi so to speak. That said, unless it was something that impacted the federal government directly (or someone in a powerful position) chances are it wouldn't even cross my radar. You'd be surprised though how many people slip up with careless mistakes. Things like not forwarding their DNS requests as well as traffic, or using the same pitch / tunnel for personal work.|
|Let's say I was publishing classified information from governments of the top 20 most powerful nations in the world and my modus operandum was "you can't catch me!" being left everywhere I visit, in combination with total anonymity. You'd basically just wait for me to slip up?||You'd be one of hundreds of targets being analyzed.|
|You start by working with what you know, locations, data types, pretty much any info and start filling back from there. In all actuality it could take years and likely it would be a slip up.|
|Interesting: If you're a hacker for governments (and do people say hacker??), one wonders why you're breaking the rule to talk about it when you don't actually want to say anything substantial in the first place.||That's a tough question, I would say that yes in the end it is. Now the tough part is where do you draw the line? The US constitution primarily applies to us citizens and that affords certain legal protections for its citizens. Alternatively, look at the EU where they grandfather every person in the world regardless of their citizenship. It's these varying policies that make it murky water.|
|I guess my first question is why are you doing this AMA when you can't actually give us insight into what you do? Because I don't think that question will be very productive, I have a more academic one about cybersecurity as warfare vs cybersecurity as intelligence.||Mis information is just as powerful as truthful information. No one needs to know everything and honestly that sheltered bubble is what makes our way of living here work. That said, there is always a place for reform and regulation to protect citizens. When it comes to protecting and minimizing, there is a pretty well accepted standard that a lot of the world follows. There are however a few people that are selfish and fail to look at the impact on a global scale. Any excessive electronic warfare will have residual effects that can far outweigh the gains.|
|question: Do you think that cybersecurity is an extension of intelligence (i.e., everything is fair game) – which is implied through cyber being an extension of technological enabling intelligence methods – or of international conflict (i.e. warfare), which triggers a number of international laws and norms?||Where we start is by educating people to protect themselves. The majority of successful attacks aren't extremely sophisticated, but merely rely on the lack of basic knowledge of users. We should probably invest here as well, it would certainly create a higher level of difficulty for the average cyber criminal.|
|If the former, i.e., intelligence, why is there such a disjunction between the media and public (who see things like international spying as illegitimate, confronting, immoral, etc) and those who are educated about international relations (who understand that spying is part of the international system)? Moreover, how can we reduce this disjunction and make the public realise that countries spy on each other, that it's a norm, and that it serves a purpose for the country and for the international system? If the later, i.e., warfare, how do we then go on to create a framework of laws and norms that will help guide cyber-warfare in such a way that it minimises harm to civilians, focuses on outcomes, operates within a relatively predictable system, and so on?||I think a large part of the disparity lies exactly on what the public knows. Disinformation can work to your benefit to. I.|
|I don't really understand, though: do you think cybersecurity is mainly warfare or intelligence?||Intelligence, but once again If I found out you were in my network i'd be mad. Some will retaliate, others know it's part of the game. That's what makes it Warfare. The hard attacks on critical infrastructure, that could be deemed warfare because the only beneficial outcome is destruction / immobility etc.|
|Say you find a key to a bazillion bitcoin wallet on a terrorist's computer do you transfer it to your wallet or the government's wallet? ... assuming the gov't has a wallet.||That's a good question. I'd have to be a long con, i'm pretty sure a transfer that large would be noticed by the majority of the bitcoin universe.|
|I will say this, black op funds are just that. Not everything is funded from traditional financing. Think of it like this, cops often use drug dealers cars and re purpose them. This sometimes happens for us too. Though never direct, usually into generic fund pools.|
|Can you provide my personal details via pm? :3||Nope couldn't even if I wanted to. It'd break a few laws and regulations. Plus everyone deserves their privacy :D|
|Either way, I'm afraid to down vote you.||Well I may have told Kim Jon-Un to put his army at the ready! Good choice : )|
|Plus everyone deserves their privacy. Coming from a hacker. Who works for the government. Y ^ ___ ^||Doesn't mean I don't believe it ;)|
|Hahah i hope i wasn't offensive brother, i was just pointing out the irony in the conversation. made me chuckle.||No offense taken :D.|
|It's definitely ironic. Plus i'm sure plenty think i'm just some shill to say the government is great and infallible.|
|Do you have any favorite stories from your work? I understand if you can't disclose any of that but I figured it doesn't hurt to ask!||Well one fun one is, we one evening while I was working on a project we broke out into what started as an impromptu nerf/soft toy war and ended up becoming this crazy venting point (as i'm sure happens everywhere), usually not a problem after hours. The problem was as soon as someone went crazy and started throwing foam footballs one of the Senior aids to the President walked in un-announced. This was crazy because it just doesn't happen like that, there's always a heads up and and an entourage with everyone putting on their a game. We all just stood there with a "whats up" look not realizing who they were.|
|It wasn't until after the incident in the next days morning brief that we were informed. Apparently he though it was funny.|
|How do you "hack" these people, lets say they run linux or whatever? Or is it on the people using aol and unpatched windows xp that are easy ones?||I would say a large part is simple laziness on the targets perspective. Work smarter not harder. Things like using FTP with credentials in the clear text. On the harder tasks, maybe there's a human intelligence piece, maybe there's a targeted attacked on a lateral target (girlfriend or mother that may use their systems). There are hundreds of possibilities. There isn't one system that is weaker, it's the implementation and adherence to security policies that are the keys to the city.|
|What do you make of the 9/11 conspiracy theories?||Most are crap, it was truly a horrific terrorist attack. I won't deny that it increased spending in the Intel community, but there were plenty of things already in motion kicking that off.|
|Have you seen the other videos from the pentagon other than 1fps vidoe released? Everyone knows there are more than just that video that could be released. Why are those videos not released? (if you know).||There's always the thought and notion of more videos. If they exist they're well hidden and covered.|
|There is always a possibility of a larger darker conspiracy, i'll be the first to admit it. I can promise though that something like that wouldn't stay hidden for long, too many people with immense emotions attached to it.|
|Most are crap.||It's a generic statement as i'm not aware of every theory, therefore I can't comment on each one.|
|Not sure if the conspiracy nuts are right, but I want the truth, the whole truth and nothing but the truth. I mean fuck sake we still have JFK docs that are classified.||I agree, there are a lot of the older generational classified docs that really make no sense. We've come a long way and we have along way to go.|
|Well played, in the nicest way possible: when you hack for politics you start to speak like a politician :P.||And that is one of our problems. We're segmented. Those that can speak in groups and the techies. It's vary hard to traverse both and that's where many redditors can make an impact. Even if they grasp 1/3 of what we're talking about, it's more than the average person knows. On the plus side, my mom can't tell a pc from a toaster and even she's afraid of virus's. Though she though Norton caused them, because of what she heard on NPR. :P.|
|The hackers I've met/been all have about 1/3rd of your social skills.|
|What's the most corrupt country? Have anything bad happened to you in the times of your career? What is it feel like being a hacker?||I mentioned on another question corrupt is subjective. I would say the worse the human rights violations are the worse the actor.|
|I have had bad things happen, i've made mistakes and taken gambles that didn't always pay off as I'd like.|
|I consider it a job of learning daily and for that sole fact it's great!|
|Could you walk me through what exactly you do in your line of work? If I wanted to steal money of a bank website, how exactly would I go about that? Would I have to do the cliché'd "find their admin page" whatever, and if I made off with the money, would I have to patch it up with fake code? Are you a complete white hat, or a few spots of grey here and there?||As far as a database, likely the original analyst would have tasked up and researched a lot of the information i'd need. Systems and their related com info (ip etc) and usually they would have already had an advanced vulnerability scan performed. From there i'd attempt to leverage an exploit through some means (attack directly or in most instances latterly) , priv escalate, do a bunch of recon and most likely sit on it for a few days. No one is every numb to what is going on, it's their level of response that you worry about. I won't comment on specific individuals or groups.|
|May be you can do a little favor here,||Bro Hug I wish I could tell you one way or the other. I've been there and it sucks.|
|The girl I m dating - is she currently seeing someone else or is it just a suspicion, Who did she call last night?||I'd hope she called family or an old friend to wish them well for the holidays.|
|Are you a wizard?||Well I can make packets do tricks, but I suck and spells.|
|So a Muggle with a stolen broken wand maybe?|
|I've actually had my eye on computer science and specifically network security and would love to get some info or pointed towards some resources that you'd recommend? :)||I'd say it 10% school and 90% on the job. Reach out to your school network admins / comp sci departments and get that hands on time. If you have passion, you'll make it.|
|Thanks so much. :) I've actually been putting in the effort to reach out to my school IT to see if I could follow him around, and then I mess around on the comp quite often(being all the time), so there's that haha. You rock man!||A good cheap learning method is a Virtual Lab - the Deice iso's are great.|
|People specialize in different focus's here. We have the firewall / router guys, the unix guys, the windows guys, the web app guys etc.. Find something that intrigues you and sponge it up!|
|Best of luck!|
|You said you've worked around the globe. What was the biggest shithole that you've been to? As for the various governments, do they themselves think of the work you do as more glamorous than it really is? (Do the expect you to just "hack" your way through anything?) Thanks for the AMA!||Biggest shithole, probably Western Sahara figuratively and literally.|
|Yes the majority of policy / decision makers in the various forms of government are very far from understanding what's going on let alone how it's handled. I think this is where a lot of questionable or confusing statements are made. Sadly, you're taught to give a presentation to the lowest possible denominator (aim for a 4th grade level and build up as needed). It really is time we re-assess and move younger more tech savy individuals into the decision making process. Limit the duration on congressional and senate terms, bring in the young blood.|
|One time we mirrored one computer across multiple systems (and I mean dozens) and sat whomever we could find in a chair to pretend otherwise they would think it was impossible for small teams to handle an operation. It really is a dog and pony show and that detracts from quality work and decision making.|
|I'm not an ageist, there are a few that get it, most though are playing the politics game and trying to make a few bucks with no real interests.|
|How common is it for government hackers to be former black hats?||Not very common, Most would fail the background checks.|
|JESTER?||Feigned ignorance is bliss. You can deny deny deny.|
|Just kidding... Actually, I'm curious. We hear about high-profile cyber activists working for Russia, China, Eastern Europe, etc and they often seem to have some sort of governmental support. How much does the government know about pro-government hackers operating within its borders?||That's all I'll say on that one.|
|I would think they might be supported and possibly even receive coordination so they don't interfere with official government ops, but are you able to elaborate?||There are instances where internal groups will battle each other for credibility in those countries, that's always fun to watch. The power struggle, the victor and the spoils. All the while emotions cause sloppiness.|
|How did you start hacking?||Hacking is a generic term. I think anyone intrigued by how things work and follows through with learning is essentially hacking their mind. So in that regard I went that way. I learned a lot messing with Bulletin board systems in the early 90's, that's also where I learned the power of social engineering and leveraging resources. From there it was school and then work applying everything up to that point.|
|I don't know if it's been asked already.. But, how much money do you make per year?||Federal pay scales are made public, there's the GS system band with multiple variables and then it goes extended. There are also Private entities owned and operated that sub contract to the government for certain positions as well. This is to keep pay fair and commensurate.|
|My highest pay i've held private was just shy of $200k. For the Government the average for a 5 -7 year analyst is GS9-11 pay. Most of us started at GS 13 depending on experience. It's convoluted. I'm not going to revel my pay band and or stepping now because of identifiable information. Bottom line is you can make good money. The positions advertised will give you the starting ranges.|
|Why do the goverments work against each other? Instead of doing the next step towards a better world, we basicly are on a good way to extinct ourselfs. Or is it a fight against corrupt goverments?||It's all about power plain and simple. Always will be as long as man has free will and the ability to want more.|
|Is there any "truth" being spread out there about the govt/whatever you do that you'd like to refute because it's just too exaggerated?||No one has the time to listen to phone calls or read the emails of everyone in the world.|
|Lets stop and think about how much data that is, then how many man hours it would take. Just not feasible. It's like throwing a rock at the moon and hoping to hit it (even though we know it'd never make it). It's very specific and focused or else it'd be a waste of resources.|
|What questions should we be asking?||Whatever you want I'll censor what I need to.|
|No, my question was what should I ask you? I'm obviously not as informed as you are, and my questions would be superficial at best and terribly ignorant at worst. I don't know enough to even comprehend what I don't know.||Well, you can ask me about clarity with anything in the leaked docs. Ask about anything you want really.|
|So I asked you, what questions I should be asking. So if you were me, what would you want to know and ask about? What's important knowledge?||A question I'd always ask is, do you consider yourself good or evil? To which I replied, it's subjective. One countries hero is another's terrorist. I like to think I live a moral life, but as we know morality is a flawed notion.|
|What'd the attitude towards snowden and what he did?||I think information is important and some should be shared. I think in the context of Snowden, the issue you have is he didn't work in any of the directorates he stole from, nor was he privy to all the info. It's easy to paint a picture when certain parts are withheld. I believe he did what he felt was right and that's what matters to him.|
|I will say that these things often backfire though making things much worse in the long run. Things will be more compartmentalized and it will make it harder for those of us that have concerns to voice them and address them.|
|maybe you shouldn't break the law (the 4th amendment) and someone with clearance won't have to leave the country to tell the truth.||Well that's it. Any data acquired would be through appropriate warrants through the FISA courts. Accidental collect is legal as long as it's not actioned upon and properly disposed of. I'm not going to comment on him as a person as I don't know him, but despite claims by the media there are measures in place. Nothing being done has been done without government approval or sanction. It's very easy to paint a picture to your liking when you limit your pallet to only the colors you like.|
|Maybe you should just tell congress, anonymously if needed or just inform the press like Snowden did.|
|Any data acquired would be through appropriate warrants through the FISA courts.||Remember your data is traversing public infrastructure privately owned and operated, which makes it even stickier. Logging on any firewall would be metadata.|
|This also ignores the vast data collected on all Americans, I do not care if you or anyone considered meta data fair game, it is a violation of 4th amendment because I know for a fact you do not have a warrant for such collection of every American.||I agree with your concerns, but unfortunately you don't have all the facts and honestly that's what needs to change for everyone. There is a need for more transparency I agree. But there will always be limits.|
|Can you hear a good story about you shitting your pants? I have lots of them myself, but this thread isn't about me. So...||I've literally shit my pants more than once (though that was usually because of shitty 3rd world sanitation and food quality),|
|One time while on an operation in the field my laptop got hit by a 7.62 round. That made me pucker up a slight bit. Fortunately most work was from the safety of a desk and that wasn't too often.|
|Do you have any information that is secret/classified that would shock the general public if it were released?||I think anything could be shocking given the wrong context. You would be surprised at how many people are really victims to fraud and more so the businesses unaware of the IP theft. I once sat in on a meeting with a firm trying to sell a multi million dollar platform to the government, only they didn't realize we had already pulled the source code of a foreign adversary network.|
|What branch of the government do you officially work for. Is it NSA, CIA, FBI or something more mundane?||I work for the US IC community. I've performed operations for all three and each of them are different, the tools, techniques, procedures all have restrictions and specific requirements. I mostly operate CNE which by default is an NSA covered operation.|
|Thanks for the answers. I guess I never really thought about how big and involved fraud and IP theft is, but once you say it, it makes perfect sense.||Everyone always says numbers are exaggerated. Their not, no one knows how much, but i've seen billions personally.|
|Could you talk about the data gathering practices of private companies?||One company in the valley had a cluster with multiple petabytes of raw live user data that anyone could perform research on with no restrictions. In addition to acccess to live data as needed.|
|It was the wild west there, and they wondered why hackers were exfiling so much data. Sigh|
|It's probably not who you think either.|
|Do you have teams developing and banking 0 days for different ops? What % of your attack vectors would you say are technical intrusion vs. social engineering. Have you ever 'framed' other agencies or groups with noisy callbacks to known group / agency cnc? Would you agree that most "protection" is essentially useless vs a targeted attack?||Can't comment on most of these.|
|I would say social engineering / user error is a vast majority of our luck (or at least getting through layer 1/ outer network perimeter).|
|Imitation is flattery, subvert the subverted or something like that.|
|Yes, most targeted attacks will succeed. Actually most attacks will, give the right time and resources (bankroll to buy time / equipment / 0days etc).|
|Hacker or IA? Because offensive hacking is not an every IC branch ordeal. Contractor or civilian? And by hack, do you mean CNA or CNE? Or just analysis after the red team has done their thing? I can ask a million questions but they don't really matter much without the previous being answered.||The operations are directed by the IC in charge. Each agency has its own rights and restrictions. 99% of the work is CNE across the IC. CNA is not something that's just done on a whim, it requires a lot of boxes to be checked by a lot of people. Most CNA would be field related operations in a somewhat controlled environment. There isn't a whole, lets take down wallstreet time operation going on, more of the shut down these forums, or this communications tower etc.|
|Rarely is CNA directly authorised or sanctioned. If so those operations are directed by military personnel|
|Hi, and thanks for your AMA. You've answered a few times questions regarding enrolment, degrees or "how do you get into this field". I'm wondering if you could tell us more about the background checks. What's in them? What findings during a background check would be a deal-breaker? Are they executed right after you apply somewhere (i.e. right after you sent an email, before you get any replies)? Like some previous screening? Or rather when you've already been considered for an interview and it becomes an integral part of the interview process?||Background checks are interesting. There are your traditional screenings for your security clearance. Depending on the level, you may go back 2 years, 7, 13 or even more if you're getting specific caveat access. Additionally there are routine background checks during your employment. The more sensitive the job, the more frequent. Sometimes they'll do them before they even approach you about specific opportunities. Sometimes you'll have plants in your office there specifically to observe you in your normal habbit. It's pretty sur-real sometimes.|
|Blondes or brunettes?||Brunettes, though I'm never one to turn away a beautiful woman.|
|What is your favorite port?||Favorite port... that's a tough one, depends too much on network restrictions I might face so there's never really anything consistent. I will say it's better to hide in plain sight in some instances.|
|When you say private security firms are you talking about Booz and the bigger guys who contract desk jobs? Or are you talking about Xe/Blackwater which contracts people downrange? I didn't think those guys were involved in any sort of intelligence work.||Both. Xe is definitely in Intel, i'm pretty sure they have job postings for it. Humint is still intel for the IC (aka boots on the ground). Most of the Xe guys are ex operators too. We have had our fair share of people looking at screens saying this is awesome looks good (when it was really just an MRTG diagram or a Nagios system status etc.) They all fake the funk when they visit the IC community and their varying offices.|
|How many times do you type "nmap" on any given day? Fellow Hacker.||Trick question.. anything repeated more than twice you script ;)|
Bitcoin Billionaire is a casual game of the increasingly established genre of the ‘clickers’, in which we only have to press the screen repeatedly to get bitcoins. No real bitcoins, it is understood, but bitcoins inside the game, bitcoins of lies. The game system, as it happens in all titles of this type, is very simple. We just have to press the screen very quickly to get bitcoins. Also ... We designed Bitcoin Billionaire based on our own algorithms and projections to create a great Bitcoin investing machine. Spend a bit of time with Bitcoin Billionaire every day and set some of your funds aside for investing with the software. Since we make Bitcoin Billionaire using algorithms and projections that are proven to work, this takes a ... Daily $5 FREE bitcoins in our Grabbit game. Play COD, Madden, NBA 2k and other console/pc games in heads up games and tournaments. Captain Pearl. By GameVault. Strategy / RTS. Rank #68 Increase Rank! You start as a Captain and owner of one boat that can catch up to 7 fish/hour. You can then sell those fishes for Pearls ( Blue and White). White Pearls -> Buy more boats to increase your fishing ... Is Bitcoin Billionaire Serious or Not: The Verdict! 1). Bitcoin Billionaire claims to have a success rate of about 88%. 2). The website and platforms are user-friendly for both experienced and ... Download Bitcoin Millionaire - Money Tycoon Game for PC - free download Bitcoin Millionaire - Money Tycoon Game for PC/Mac/Windows 7,8,10, Nokia, Blackberry, Xiaomi, Huawei, Oppo… - free download Bitcoin Millionaire - Money Tycoon Game Android app, install Android apk app for PC, download free android apk files at choilieng.com
[index]          
Bitcoin billionaire does what very few freemium games can... Make you actually enjoy the time spent watching the ads. That's not to say that the game is bad by no means. If you're willing to look ... Tapper Game [Bitcoin Billionaire] - Duration: 11:21. PewdsRoomsEthan 39 views. 11:21. NOOB vs HACKER! *NEW* Game Mode in Fortnite - Duration: 21:11. SSundee Recommended for you. 21:11 . CHEAPEST ... Bitcoin Billionaire Review 2020 Was The Bitcoin Billionaire Dragons Den a SCAM or LEGIT? Find Out! - Duration: 3:33. Crypto Trading Strategies 11,353 views Bitcoin Billionaire is an auto trading software based on algorithms that allow it to place trades automatically, without requiring you to take any action. Platforms like this one claim to be 0.01 ... A massive new update to Bitcoin Billionaire has arrived! How massive? Three times the content massive! Ever wanted to mine bitcoins from a desk in a cave? Now you can! Unleash the power of time ...